Further Credentials Theft
We will list some advanced methods to recover credentials:
Cmdkey Saved Credentials
The cmdkey command can be used to create, list, and delete stored usernames and passwords
To see if some credentiasls have been saved:
> cmdkey /list
Target: LegacyGeneric:target=TERMSRV/SQL01
Type: Generic
User: inlanefreight\bobWe can't read the password but when we attempt to RDP to the target SQL01 the saved credentials will be used:

We can also use runas:
Web Browser Credentials
Retrieve cookies & login forms from Google Chrome:
KeePass Password Manager
KeePass is a password manager stored locally on the host. The database file ends with .kdbx
We can:
Transfer the .kdbx to our attacking machine
Use a tool such as keepass2john to extract the password hash
Crack the password with Hashcat or John the Ripper
Extract the hash
Crack the hash
Microsoft Exchange E-Mails
We use the tool MailSniper to look for credentials in microsoft exchange e-mails.
Lazagne.exe
LaZagne looks for credentials in various places:
To run a full search with all modules:
Session Gopher
We can use SessionGopher to extract saved PuTTY, WinSCP, FileZilla, SuperPuTTY, and RDP credentials.
Clear-Text Passwords in Registry
Certain programs and windows configurations can result in clear-text passwords or other data being stored in the registry.
Windows AutoLogon
Windows Autologon is used to configure their Windows operating system to automatically log on to a specific user account without requiring manual input of credentials.
The username and passwords are stored in clear in the registry at:
It has 3 values usually:
AdminAutoLogon- "0" for off "1" for onDefaultUserNameDefaultPassword
We read the values with:
Putty
For Putty sessions utilizing a proxy connection, when the session is saved, the credentials of the proxy are stored in the registry in clear text.
First we enum the sessions:
We can check the credentials of the session we found:
Wifi Passwords
List wifi connected to recently:
Depending on the network configuration, we can retrieve the pre-shared key (Key Content below) and potentially access the target network:
Last updated